Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems

Physical Communication - Tập 33 - Trang 16-25 - 2019
G.B. Satrya1, S.Y. Shin1
1ICT Convergence, Kumoh National Institute of Technology, Gumi, Gyeongbuk 730-701, Republic of Korea

Tài liệu tham khảo

Mac Donald, 1979, Advanced mobile phone service: The cellular concept, Bell Labs Tech. J., 58, 15, 10.1002/j.1538-7305.1979.tb02209.x Cox, 2012 Schneider, 2015, Towards 5G security, 1165 Dahlman, 2014, 5g radio access, Ericsson Rev., 6, 2 N. Alliance, 5G white paper, Next generation mobile networks, white paper. Park, 2014, 5G vision and requirements of 5G forum, korea Saito, 2013, Non-orthogonal multiple access (noma) for cellular future radio access, 1 Viterbi, 1990, Very low rate convolution codes for maximum theoretical performance of spread-spectrum multiple-access channels, IEEE J. Sel. Areas Commun., 8, 641, 10.1109/49.54460 Massey, 1988, An introduction to contemporary cryptology, Proc. IEEE, 76, 533, 10.1109/5.4440 Mukherjee, 2014, Principles of physical layer security in multiuser wireless networks: a survey, IEEE Commun. Surv. Tutor., 16, 1550, 10.1109/SURV.2014.012314.00178 Shiu, 2011, Physical layer security in wireless networks: a tutorial, IEEE Wirel. Commun., 18, 66, 10.1109/MWC.2011.5751298 Qin, 2016, Physical layer security for 5g non-orthogonal multiple access in large-scale networks, 1 Ding, 2017, On the spectral efficiency and security enhancements of noma assisted multicast-unicast streaming, IEEE Trans. Commun., 65, 3151, 10.1109/TCOMM.2017.2696527 Barros, 2006, Secrecy capacity of wireless channels, 356 Zhang, 2016, Secrecy sum rate maximization in non-orthogonal multiple access, IEEE Commun. Lett., 20, 930, 10.1109/LCOMM.2016.2539162 Chen, 2018, Physical layer security for cooperative noma systems, IEEE Trans. Veh. Technol. Xiao, 2018, Opportunistic multicast noma with security concerns in a 5g massive mimo system, IEEE Commun. Mag., 56, 91, 10.1109/MCOM.2018.1700671 Satrya, 2017, Security enhancement to successive interference cancellation algorithm for non-orthogonal multiple access (noma), 1 He, 2017, On the design of secure non-orthogonal multiple access systems, IEEE J. Sel. Areas Commun., 35, 2196, 10.1109/JSAC.2017.2725698 Zheng, 2018, Secure noma based two-way relay networks using artificial noise and full duplex, IEEE J. Sel. Areas Commun., 10.1109/JSAC.2018.2824624 Liu, 2017, Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks, IEEE Trans. Wirel. Commun., 16, 1656, 10.1109/TWC.2017.2650987 Wyner, 1975, The wire-tap channel, The Bell Syst. Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x Xu, 2018, Security-aware resource allocation with delay constraint for noma-based cognitive radio network, IEEE Trans. Inf. Forensics Secur., 13, 366, 10.1109/TIFS.2017.2750106 Froom, 2010 Byun, 2006, Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol, IEEE Commun. Lett., 10, 683, 10.1109/LCOMM.2006.1714545 Nam, 2008, Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks, IEEE Commun. Lett., 12, 127, 10.1109/LCOMM.2008.071384 A. Mathur, A. Wielgoszewska, User equipment and method for protection of user privacy in communication networks, uS Patent App. 15/924,587 (Oct. 4 2018). G.R. Seidman, N. Fathi, K. ten Hagen, S. Andreatta, Method and apparatus for uniquely identifying wireless devices, uS Patent App. 15/987,746 (Sep. 20 2018). Katz, 1996 Nosrati, 2015, Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper, 7365 Nosrati, 2015